Results 51 to 60 of about 35,271 (280)
Strong Secrecy on the Binary Erasure Wiretap Channel Using Large-Girth LDPC Codes
For an arbitrary degree distribution pair (DDP), we construct a sequence of low-density parity-check (LDPC) code ensembles with girth growing logarithmically in block-length using Ramanujan graphs.
Bloch, Matthieu +3 more
core +1 more source
Extending DIRAC File Management with Erasure-Coding for efficient storage [PDF]
The state of the art in Grid style data management is to achieve increased resilience of data via multiple complete replicas of data files across multiple storage endpoints.
Britton, David +4 more
core +2 more sources
NF90–NF45 functions as a negative regulator of methyltransferase‐like 3/14 (METTL3/14)‐mediated N6‐methyladenosine (m6A) modification on primary microRNAs (pri‐miRNAs). NF90–NF45 binds to anti‐oncogenic pri‐miRNAs and inhibits their m6A modification, thereby suppressing the biogenesis of anti‐oncogenic miRNAs.
Takuma Higuchi +6 more
wiley +1 more source
xStripeMerge: efficient wide stripe generation approach based on erasure coding storage
To address the issue of wide stripe generation in existing erasure coding storage systems, where storage scaling approaches resulted in a significant increase in wide stripe generation bandwidth and stripe merge scheme was constrained by dual-stripes, an
Meiguang ZHENG +3 more
doaj +2 more sources
YIPFα1A expression is regulated by multilayered molecular mechanisms
YIPFα1A, a five‐pass Golgi protein, is regulated at multiple layers. (1) Rare‐codon enrichment drives translation‐coupled mRNA decay. (2) A proximal 3′‐UTR element stabilizes mRNA. (3) A distal 3′‐UTR element included by alternate poly(A) site usage represses translation, which can be overridden by the proximal 3′‐UTR element.
Tokio Takaji +2 more
wiley +1 more source
A Secure Cloud-Edge Collaborative Fault-Tolerant Storage Scheme and Its Data Writing Optimization
Fueled by the explosive growth of edge smart IoT devices, edge storage systems (ESS) have emerged as a new paradigm to support the efficient access of massive edge data.
Junqi Chen +3 more
doaj +1 more source
Packaging of Macroscopic Material Payloads: Needs, Challenges, Concepts, and Future Directions
This review introduces a unified framework that decomposes any macroscopic packaging system into the payload, packaging material, and packaging strategy and combines them into a conceptual packaging equation: packaging strategy = payload + packaging material.
Venkata S. R. Jampani, Manos Anyfantakis
wiley +1 more source
A sequence‐encoded supramolecular construct containing two accessible toeholds is developed herein for enabling multiple editing operations. By introducing specific input strands, it is possible to selectively erase or rewrite digital content through parallel or series toehold‐mediated strand displacement (PTMSD or STMSD).
Jakub Ossowski +3 more
wiley +1 more source
Frame erasure concealment method used for wideband embedded speech codec
An efficient frame erasure concealment(FEC)method for wideband embedded speech codec was proposed.The erased speech frame was classified as voiced,unvoiced,silence,unvoiced transit to voiced and voiced transit to unvoiced at decoder.The energy of ...
ZHU Heng, BAO Chang-chun, LI Rui
doaj +2 more sources
We introduce the blind index coding (BIC) problem, in which a single sender communicates distinct messages to multiple users over a shared channel. Each user has partial knowledge of each message as side information. However, unlike classic index coding,
Avestimehr, A. Salman +2 more
core +1 more source

